• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 132
  • 19
  • 11
  • 5
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 183
  • 183
  • 75
  • 75
  • 60
  • 53
  • 52
  • 48
  • 36
  • 30
  • 29
  • 29
  • 25
  • 23
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Statistical Analysis Of Visible Absorption Spectra And Mass Spectra Obtained From Dyed Textile Fibers

White, Katie Margaret 01 January 2010 (has links)
The National Academy of Sciences recently published a report which calls for improvements to the field of forensic science. Their report criticized many forensic disciplines for failure to establish rigorously-tested methods of comparison, and encouraged more research in these areas to establish limitations and assess error rates. This study applies chemometric and statistical methods to current and developing analytical techniques in fiber analysis. In addition to analysis of commercially available dyed textile fibers, two pairs of dyes are selected based for custom fabric dyeing on the similarities of their absorbance spectra and dye molecular structures. Visible absorption spectra for all fiber samples are collected using microspectrophotometry (MSP) and mass spectra are collected using electrospray ionization (ESI) mass spectrometry. Statistical calculations are performed using commercial software packages and software written in-house. Levels of Type I and Type II error are examined for fiber discrimination based on hypothesis testing of visible absorbance spectra using a nonparametric permutation method. This work also explores evaluation of known and questioned fiber populations based on an assessment of p-value distributions from questioned-known fiber comparisons with those of known fiber self-comparisons. Results from the hypothesis testing are compared with principal components analysis (PCA) and discriminant analysis (DA) of visible absorption spectra, as well as PCA and DA of ESI mass spectra. The sensitivity of a statistical approach will also be discussed in terms of how instrumental parameters and sampling methods may influence error rates.
112

The body of a perpetrator as source of physical evidence in rape : a case study in Bahir Dar/Amhara Region/Ethiopia

Bayih, Adane Genetu 10 1900 (has links)
The aim of this research is to determine what physical evidence can be found on the body of the perpetrator to link the suspect with the crime of rape. Regarding this, the researcher was trying to introduce a number of important concepts such as forensic investigation, chain of custody, evidence, information, identification, individualization, crime scene and the Locard Principle. This research will explain the meaning of forensic investigation, the objective of criminal investigation, the difference between information and evidence and individualization and identification. An important principle which all investigators and prosecutors should know is the Locard Principle. It says: "Every contact leaves a trace". The principle further explains that, whenever two objects come into contact with one another, material from the first would be transferred to the second and material from the second would be transferred to the first. Although this principle is important for investigators as well as prosecutors, most of them do not know the principle. The other important thing is the consideration of the body of the perpetrator as a crime scene to prove a crime. A crime scene is defined as an area where a criminal act has taken place. If we get evidence from the body of the perpetrator, we can then consider it as a crime scene. Lastly, regarding the legal rights to collect evidence on the body of the perpetrator, there should be specific laws in Ethiopia. However, there is no specific law. In addition to this, there is no DNA investigation in Ethiopia. Hence, this research will enhance the skills of investigators and prosecutors will benefit from what I have discovered through the research and I am very pleased to be the first Ethiopian in the introduction of the field of forensic investigation to the readers. / Forensic Investigations / M. Tech. (Forensic Investigation)
113

The body of a perpetrator as source of physical evidence in rape : a case study in Bahir Dar/Amhara Region/Ethiopia

Bayih, Adane Genetu 10 1900 (has links)
The aim of this research is to determine what physical evidence can be found on the body of the perpetrator to link the suspect with the crime of rape. Regarding this, the researcher was trying to introduce a number of important concepts such as forensic investigation, chain of custody, evidence, information, identification, individualization, crime scene and the Locard Principle. This research will explain the meaning of forensic investigation, the objective of criminal investigation, the difference between information and evidence and individualization and identification. An important principle which all investigators and prosecutors should know is the Locard Principle. It says: "Every contact leaves a trace". The principle further explains that, whenever two objects come into contact with one another, material from the first would be transferred to the second and material from the second would be transferred to the first. Although this principle is important for investigators as well as prosecutors, most of them do not know the principle. The other important thing is the consideration of the body of the perpetrator as a crime scene to prove a crime. A crime scene is defined as an area where a criminal act has taken place. If we get evidence from the body of the perpetrator, we can then consider it as a crime scene. Lastly, regarding the legal rights to collect evidence on the body of the perpetrator, there should be specific laws in Ethiopia. However, there is no specific law. In addition to this, there is no DNA investigation in Ethiopia. Hence, this research will enhance the skills of investigators and prosecutors will benefit from what I have discovered through the research and I am very pleased to be the first Ethiopian in the introduction of the field of forensic investigation to the readers. / Forensic Investigations / M. Tech. (Forensic Investigation)
114

The analysis of a cheque to identify crime

Kruger, Deidre Jacoba 28 February 2006 (has links)
In this study the main focus of the researcher was to analyse a cheque to identify crime. This study intends to give the forensic investigator a guideline to follow during the analysis of a cheque under investigation. Crimes that could be detected during the analysis of a cheque are fraud, forgery and uttering. Other aspects were also explained to ensure a better understanding of the study, namely: forensic investigation, forensic investigator, identification and crime scenes. Forensic investigation is a systematic search for the truth with the primary purpose of finding a positive solution to a crime. Forensic investigation is not a game of chance, or based on storybook types of coincidences. Therefore, forensic investigators cannot rely on coincidental success to come their way. It is true that luck sometimes plays a role in forensic investigations, but it is the thorough investigator who creates his/her own opportunities and arrives at the right place at the right time. In order for a forensic investigator to strive for excellence, he/she must have a good knowledge of his/her field of work. It is important for the forensic investigator to understand that identification plays an important role in forensic investigation. An additional benefit is derived when one can individualise something because it makes the identification much more valuable. All crime scenes should furthermore be managed in such a way that all physical evidence can be collected in order to ensure successful prosecution and conviction in a court of law. It is the belief of the researcher that because cheques are not acknowledged as crime scenes and therefore not properly handled or protected, many investigations fail in court and the accused are acquitted. / Criminology / M. Tech. (Forensic Investigation)
115

Developing a checklist for examining a fraudulent cheque

Meijer, Annelie 28 February 2006 (has links)
My goal in this research was to develop a checklist for examining a cheque for information that can be used to identify, individualise and trace the perpetrator of a crime. A further intent was to share and introduce a number of important concepts, namely forensic investigation, identification, individualisation, the Locard principle and crime scene. This research will explain that forensic investigation refers to the using of sophisticated investigation techniques to obtain sufficient information to prove the true facts in a court of law. Further, that identification is the collective aspect of the set of characteristics by which an object is definitively recognisable or known, while the individual characteristics establish the individuality of a specific object. To link an individual with a crime scene, many types of evidence may be used and to associate an individual with the performed illegal handling, many types of evidence may be used. These types of evidence are commonly referred to as ”transfer” evidence. This process is also referred to as the ”Locard principle”. Lastly, a crime scene is explained as a place where a crime has occurred. It is also explained to be a ”laboratory of information” and therefore, during a cheque fraud investigation, the cheque is in most cases the only link to information to trace, identify and individualise the perpetrator. Therefore, the cheque should be treated as a crime scene. If forensic investigators use their knowledge of these concepts together with the checklist, it should enhance their investigation skills and empower them to become better equipped for the challenges they face in identifying, individualising and tracing the perpetrators in order to ensure successful prosecution and conviction. I believe all forensic investigators will benefit from what I have discovered through this research and I am very pleased to be able to introduce this checklist to you. / Criminology / M.Tech. (Forensic Investigation)
116

The processing of firearms during investigation of a crime scene

Pillay, Povendran Dorasamy 31 May 2008 (has links)
The study was conducted with the intention of identifying the current procedure employed by investigators for processing firearms evidence at a crime scene. The researcher identified shortcomings which prevent firearm evidence being found to be inadmissible in criminal proceedings. The researcher also analysed other aspects relating to the processing of firearm evidence at a crime scene, namely: Locard principle, identification, individualisation and physical integrity. In order for investigators to be successful in their investigation of cases involving firearms, it is imperative for investigators to have a clear understanding of the basic concepts surrounding firearm evidence processing. It is the strong belief of the researcher that because of improper handling, contamination and lack of integrity pertaining to firearm evidence, such evidence is being found to be inadmissible in criminal proceedings. This negative impact has a roll over effect on the conviction rate for serious crime. / Criminology / M. Tech. (Forensic Invesigation)
117

Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniques

Crundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting. The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques. The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered. It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology / M.Tech (Forensic Investigation)
118

Processing of information for prosecution purposes

Van der Merwe, C. J. (Christoffel Johannes) 31 May 2008 (has links)
The purpose of the research was to establish action steps than can assist the criminal investigator in the processing of information into evidence for prosecution purposes, by focusing on the basic principles of criminal investigation from where information sources could be utilised to their full potential in the search for the truth. The researcher evaluated the current methods that investigators within the SAPS use and read extensively on the topic in international literature sources. The research used an empirical research design because of the limited information available, and a qualitative research approach which enabled real-life observations. Simple random sampling was used to interview 30 experienced investigators each with more than five years experience and purposive sampling was used to identify five expert respondents who had more than 30 years' investigation experience. Data was obtained from their real-life experiences and data was further collected through case studies of case dockets. / Criminology / M.Tech. (Forensic investigation)
119

The psychological effects experienced by computer forensic examiners working with child pornography

Whelpton, Juliette 02 1900 (has links)
Convergence of technology has made access to the Internet faster, easier and cheaper. Criminals, including paedophiles, child abusers and pornography traders make use of this technology to commit criminal offences. Computer Forensic Examiners (CFEs) are members of the Cyber Crime Unit, a professional, specialised unit of the South African Police Service (SAPS) who are responsible for computer forensic examination including the investigation of child pornographic images. The aim of the study was to seek understanding on what psychological effects the CFEs experienced when working with the images and was conducted from within the social constructionism and the narrative frameworks. The images had a severe impact on the CFEs as was clearly uncovered in the stories of six CFEs who participated in this study. The participants' stories were recorded and transcribed after which the application of thematic content analysis found that the participants all suffered similar negative effects. These findings were integrated with the findings of a focus group as well as with the findings of a similar study that was conducted during the same time by the Crimes against Children Research Center at the University of New Hampshire and resulted in identifying symptoms of trauma and stress experienced by the CFEs. Based on these results recommendations regarding the support for the CFEs were made. / Psychology / M.A. (Psychology)
120

Computer seizure as technique in forensic investigation

Ndara, Vuyani 19 March 2014 (has links)
The problem encountered by the researcher was that the South African Police Service Cyber-Crimes Unit is experiencing problems in seizing computer evidence. The following problems were identified by the researcher in practice: evidence is destroyed or lost because of mishandling by investigators; computer evidence is often not obtained or recognised, due to a lack of knowledge and skills on the part of investigators to properly seize computer evidence; difficulties to establish authenticity and initiate a chain of custody for the seized evidence; current training that is offered is unable to cover critical steps in the performance of seizing computer evidence; computer seizure as a technique requires specialised knowledge and continuous training, because the information technology industry is an ever-changing area. An empirical research design, followed by a qualitative research approach, allowed the researcher to also obtain information from practice. A thorough literature study, complemented by interviews, was done to collect the required data for the research. Members of the South African Police Cyber-crime Unit and prosecutors dealing with cyber-crime cases were interviewed to obtain their input into, and experiences on, the topic. The aim of the study was to explore the role of computers in the forensic investigation process, and to determine how computers can be seized without compromising evidence. The study therefore also aimed at creating an understanding and awareness about the slippery nature of computer evidence, and how it can find its way to the court of law without being compromised. The research has revealed that computer crime is different from common law or traditional crimes. It is complicated, and therefore only skilled and qualified forensic experts should be used to seize computer evidence, to ensure that the evidence is not compromised. Training of cyber-crime technicians has to be priority, in order to be successful in seizing computers. / Department of Criminology / M.Tech. (Forensic Investigation)

Page generated in 0.0929 seconds